Now showing items 85-104 of 408

    • Critical Information Retrieval from Emails 

      Sen, Souvik (North Dakota State University, 2014)
      With efficiency being a driving force in today’s ecommerce, emails have become a major form of communication. However, deciphering information from these emails has been a be-labored task. With every email containing ...
    • A Data Mining Approach for Identifying Pavement Distress Signatures 

      Bouret, Megan Sue (North Dakota State University, 2015)
      This work introduces signature-based data mining of pavement distress data. The goal is to understand the factors that influence pavement distress. The presented approach maintains multiple types of flexible pavement ...
    • A Data Mining Approach to Radiation Hybrid Mapping 

      Seetan, Raed (North Dakota State University, 2014)
      The task of mapping markers from Radiation Hybrid (RH) mapping experiments is typically viewed as equivalent to the traveling-salesman problem, which has combinatorial complexity. As an additional problem, experiments ...
    • Data Replication Strategies in Cloud Computing 

      Liu, Yang (North Dakota State University, 2011)
      Data replication is a widely used technique in various systems. For example, it can be employed in large-scale distributed file systems to increase data availability and system reliability, or it can be used in many network ...
    • A Data Visualization Tool to Identify Patterns Formed by Subsets of Data 

      Osmani, Md Golam Morshed (North Dakota State University, 2010)
      An object may be identified by its properties which may comprise both continuous data values and categorical data values. Sometimes a particular property (categorical) value may select a group of objects which have ...
    • Deception in Cyberspace: Con-Man Attack in Cloud Services 

      Chowdhury, Md. Minhaz (North Dakota State University, 2018)
      A con-man deception appears in services from cyberspace, e.g., in cloud services. A cloud-service provider deceives by repeatedly providing less service than promised and deliberately avoids service monitoring. Such a ...
    • A Decision Model for Emergency Response 

      Chelaiah Rothimaswa, Ashok Kumar Vellaswamy (North Dakota State University, 2013)
      In the real world, emergencies occur at different places. The emergencies fall into three categories: a fire emergency, a medical emergency, and a police emergency. Different emergencies occur at different places at different ...
    • Decision-Making for Self-Replicating 3D Printed Robot Systems 

      Jones, Andrew Burkhard (North Dakota State University, 2021)
      This work addresses decision-making for robot systems that can self-replicate. With the advent of 3D printing technology, the development of self-replicating robot systems is more feasible to implement than it was previously. ...
    • Deep Learning Applied to Public Company Valuation for Value Investing 

      Haich, Abram Paul (North Dakota State University, 2021)
      Value investing is an investing approach that seeks to discover and take advantage of price discrepancies between the market price and the actual value of a company (intrinsic value). The purpose of this work is to measure ...
    • Demonstrating Bid Rigging with a Shopping Agent Application Using JADE 

      Sivanandam, Dinesh (North Dakota State University, 2011)
      This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
    • Design and Development of Naive Bayes Classifier 

      Garg, Bandana (North Dakota State University, 2013)
      The naïve Bayes classifier is a simple form of Bayesian classifiers which assumes all the features are independent of each other. Despite this assumption, the naïve Bayes classifier’s accuracy is comparable to other ...
    • Design and Evaluation of Two Hybrid Genome Assembly Approaches Using Illumina, Roche 454, and PacBio Datasets 

      Sun, Liren (North Dakota State University, 2016)
      The assembly of next-generation sequencing reads is one of the most challenging and important tasks in bioinformatics. There are many different types of assembly algorithms and programs that have been developed to assemble ...
    • Design and Implementation of Social Networking Website Features 

      Aakula, Srikanth Goud (North Dakota State University, 2010)
      People want to communicate and interact with each other over the internet. There are various websites which are helpful for this kind of socializing. The popularity and adaptability of each website depends on the features ...
    • Design of a Game for Cybersecurity Awareness 

      Bhardwaj, Jagjot (North Dakota State University, 2019)
      The primary objective of this paper is to use the Bloom’s Revised Taxonomy educational objectives in creating a game called Cyber Air-Strike for learning basic concepts of cybersecurity. Bloom’s Revised Taxonomy is used ...
    • Design of the Photo Album Ontology 

      Sarker, Mridula (North Dakota State University, 2010)
      At present, growing demand of the management of huge volume of web contents, especially photos, require the software tools, which can store, index and retrieve the photos from the repository more efficiently. In this ...
    • The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application 

      Tipparach, Santipab (North Dakota State University, 2019)
      Virtual Reality is currently an affordable and consumer ready technology used by many in the games and interactive media industry, however unlike the user interface standards in mobile, PCs, and Macs, VR UI design can vary ...
    • Desktop Interactive Activity Diagram Tutorial 

      Sathiaseelan, AnuEvelyn (North Dakota State University, 2015)
      Activity diagram plays a vital role in Business Process Modeling as well as System modeling. In this paper, I have proposed a desktop interactive activity diagram tutorial that has been designed for educational purposes ...
    • Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices 

      Kambhampaty, Krishna Kanth (North Dakota State University, 2019)
      There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ...
    • Deterministic Greedy Algorithms for Optimal Sensor Placement 

      Chintamaneni, Venkata Santosh (North Dakota State University, 2012)
      A sensor is a device which can be sensitive to any physical stimulus, such as light, heat, or a particular motion, and responds with a respective impulse. A graph is an abstract representation for a set of objects of any ...
    • Developing a Software Tool to Enhance the Creativity during Software Development Using the Results from the Literature Review 

      Hegde, Reshma (North Dakota State University, 2013)
      Success during software development depends on the creativity of software engineers. Knowledge plays a very important role in enhancing the creativity of software developers. Knowledge is available in different forms like ...